Use-After-Free Vulnerability in GCC C++ Compilation Tool by GNU
CVE-2021-37322

7.8HIGH

Key Information:

Vendor
Gnu
Vendor
CVE Published:
18 November 2021

Summary

The GCC c++filt tool, specifically version 2.26, has been identified to have a use-after-free vulnerability within the cplus-dem.c component. This flaw can potentially enable an attacker to manipulate memory, leading to unauthorized access or arbitrary code execution. Proper mitigation measures are essential to protect systems utilizing affected GCC versions from exploitation risks.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.